A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.

Project Subscriptions

Vendors Products
Aironet 1540 Subscribe
Aironet 1542d Subscribe
Aironet 1542i Subscribe
Aironet 1560 Subscribe
Aironet 1562d Subscribe
Aironet 1562e Subscribe
Aironet 1562i Subscribe
Aironet 1800 Subscribe
Aironet 1800i Subscribe
Aironet 1810 Subscribe
Aironet 1810w Subscribe
Aironet 1815 Subscribe
Aironet 1815i Subscribe
Aironet 1815m Subscribe
Aironet 1815t Subscribe
Aironet 1815w Subscribe
Aironet 2800 Subscribe
Aironet 2800e Subscribe
Aironet 2800i Subscribe
Aironet 3800 Subscribe
Aironet 3800e Subscribe
Aironet 3800i Subscribe
Aironet 3800p Subscribe
Aironet 4800 Subscribe
Aironet Access Point Software Subscribe
Catalyst 9100 Subscribe
Catalyst 9105 Subscribe
Catalyst 9105ax Subscribe
Catalyst 9105axi Subscribe
Catalyst 9105axw Subscribe
Catalyst 9115 Subscribe
Catalyst 9115 Ap Subscribe
Catalyst 9115ax Subscribe
Catalyst 9115axe Subscribe
Catalyst 9115axi Subscribe
Catalyst 9117 Subscribe
Catalyst 9117 Ap Subscribe
Catalyst 9117ax Subscribe
Catalyst 9117axi Subscribe
Catalyst 9120 Subscribe
Catalyst 9120 Ap Subscribe
Catalyst 9120ax Subscribe
Catalyst 9120axe Subscribe
Catalyst 9120axi Subscribe
Catalyst 9120axp Subscribe
Catalyst 9124 Subscribe
Catalyst 9124ax Subscribe
Catalyst 9124axd Subscribe
Catalyst 9124axi Subscribe
Catalyst 9130 Subscribe
Catalyst 9130 Ap Subscribe
Catalyst 9130ax Subscribe
Catalyst 9130axe Subscribe
Catalyst 9130axi Subscribe
Catalyst Iw6300 Subscribe
Catalyst Iw6300 Ac Subscribe
Catalyst Iw6300 Dc Subscribe
Catalyst Iw6300 Dcw Subscribe
Esw6300 Subscribe
Wireless Lan Controller Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24235 A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 26 Oct 2024 08:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-25T16:02:56.470Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20056

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.565Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T17:15:14.220

Modified: 2024-11-21T07:40:27.043

Link: CVE-2023-20056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses